☆432Feb 2, 2022Updated 4 years ago
Alternatives and similar repositories for External-Pentest-Checklist
Users that are interested in External-Pentest-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 7, 2022Updated 4 years ago
- Same Pentest Resume☆144Mar 12, 2020Updated 6 years ago
- ☆81May 4, 2020Updated 5 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆190Apr 26, 2020Updated 5 years ago
- Sample pentest report provided by TCM Security☆1,375Mar 18, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆28Apr 9, 2020Updated 6 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 9 years ago
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- A tool for parsing breached passwords☆2,103Mar 21, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆279Aug 12, 2022Updated 3 years ago
- MayorSec DNS Enumeration Tool☆91Nov 30, 2024Updated last year
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kali Linux Fixes for Newly Imported VM's☆2,405Jun 30, 2025Updated 9 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆799Oct 23, 2020Updated 5 years ago
- Python3 o365 User Enumeration Tool☆566Jan 28, 2026Updated 2 months ago
- Google Dork File Finder☆199Jan 6, 2025Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,049Feb 12, 2023Updated 3 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Notes for Beginner Network Pentesting Course☆6,255Sep 21, 2022Updated 3 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆265Jul 2, 2025Updated 9 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,971Jan 28, 2026Updated 2 months ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,576Jan 18, 2026Updated 3 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Apr 6, 2026Updated last week
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆219Dec 28, 2022Updated 3 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆711Sep 4, 2024Updated last year
- Short checklists for penetration testing methodology☆199Sep 5, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Browser extension that extracts users from LinkedIn company pages☆166Apr 24, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,655Jul 27, 2025Updated 8 months ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆15Apr 13, 2021Updated 5 years ago
- ☆57Jun 18, 2023Updated 2 years ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,322Apr 1, 2026Updated 2 weeks ago
- It is a compilation of some resources for preparing for OSCP.☆205May 1, 2022Updated 3 years ago